The Design of Visual RBAC Model Based on UML and XACML Integrating

被引:0
|
作者
Fan, Baode [1 ]
Li, Mengmeng [1 ]
机构
[1] Yantai Univ, Sch Comp Sci, Yantai, Shandong, Peoples R China
关键词
XACML; RBAC; Model integration; Role-permission; Score management;
D O I
10.1007/978-81-322-1695-7_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security is an indispensable part of modern software system. Access control is an important measure to guarantee the security of a system; however, the modeling of modern software system does not deal with security, which brings great hidden danger in later security maintenance and the system integration. In this paper, we use a score management system as an example, describe the visualization modeling of RBAC model using the visualized UML, and provide the details about the modeling method and concrete realization of the RBAC model into this system. At the same time, we describe the permissions between users and objects in the RBAC model, combined with eXtensible Access Control Markup Language (XACML), realized the formal description of the access control policy, simplified authorization, and increased the security of the model.
引用
收藏
页码:213 / 222
页数:10
相关论文
共 50 条
  • [31] A Hybrid Attribute based RBAC Model
    Cai, Ting
    Zheng, Jian
    Du, Xing
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 317 - 328
  • [32] An Extended Delegation Model Based On RBAC
    Li, Jinshuang
    Chang, Guiran
    2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 228 - 231
  • [33] Security Sandbox Based on RBAC Model
    Hurtuk, Jan
    Balaz, Anton
    Adam, Norbert
    2016 IEEE 11TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2016, : 75 - 79
  • [34] UML in action: Integrating formal methods in industrial design education
    Hu, Jun
    Ross, Philip
    Feijs, Loe
    Qian, Yuechen
    TECHNOLOGIES FOR E-LEARNING AND DIGITAL ENTERTAINMENT, PROCEEDINGS, 2007, 4469 : 489 - +
  • [35] Research and Application Based on RBAC Model
    Guo Xiaolai
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 388 - 391
  • [36] Design and Implementation of Authorization System Based on RBAC
    Li, Furong
    Wu, Haitao
    2015 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS IHMSC 2015, VOL I, 2015, : 502 - 504
  • [37] Integrating the SysML and the SystemC-UML profiles in a model-driven embedded system design flow
    Elvinia Riccobene
    Patrizia Scandurra
    Design Automation for Embedded Systems, 2012, 16 : 53 - 91
  • [38] Integrating the SysML and the SystemC-UML profiles in a model-driven embedded system design flow
    Riccobene, Elvinia
    Scandurra, Patrizia
    DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2012, 16 (03) : 53 - 91
  • [39] Security analysis and design based on a general conceptual security model and UML
    Blobel, B
    Pharow, P
    Roger-France, F
    HIGH-PERFORMANCE COMPUTING AND NETWORKING, PROCEEDINGS, 1999, 1593 : 919 - 930
  • [40] UML-Based Model-Driven Development for HSDPA Design
    Martinez, Jesus
    Merino, Pedro
    Salmeron, Alberto
    Malpartida, Francisco
    IEEE SOFTWARE, 2009, 26 (03) : 26 - 33